internet of things

March 22, 2019
The Internet of (Secure) Things premium
The “Internet of Things”, or IOT: we’ve all heard the term, but what does it really mean? More importantly, how do we secure all of these … “things”? First, a stab at defining the term and its components. The term “things” really refers to a broad class of devices that have one of two functions: […]
premium
don.maclean@www.dlt.com'
An Internet of Things Demo Jam: The Brains Behind the Demo premium
IoT Demo: Here Blog Part 1: Setting the Stage Blog Part 2: Architecting the Scene DLT recently partnered with GovLoop to offer a free 10 minute interactive lesson on How to Implement the Internet of Things.  GovLoop is a knowledge and social network for federal, state and local government innovators, and its Academy transforms learning […]
premium
michael.fitzurka@www.dlt.com'
Middleware Solutions Architect
February 26, 2018
Managing the Invisible Network (IoT) premium
Ah, the good old days, when things were simple. When there were a known number of devices on any government network, and the federal IT pro had a complete understanding of how to secure those devices.   Those days are long gone. Today, with the proliferation of the Internet of Things (IoT), thousands of devices […]
premium
fking@speakerboxpr.com'
February 13, 2018
An Internet of Things Demo Jam: Architecting the Scene premium
I believe that the Internet of Things (IoT) is a popular topic, in part, because its science-fiction becoming science-fact.  IoT promises all of the conveniences of “The Jetsons” without having to push buttons, while threatening to produce the surveillance states of “1984” or “Minority Report”.  Unfortunately, it most likely will give rise to the annoying […]
premium
michael.fitzurka@www.dlt.com'
Middleware Solutions Architect
February 21, 2017
How IoT Enables Us to Stay Active and Stay Safe premium
Here’s the great news about all of the energy, passion and concern felt by many about politics in our country these days:  people are active! I know so many people who are becoming energized and active in new and different ways compared to 12 months ago.   With the number of marches, protests and events spread […]
premium
gary.danoff@www.dlt.com'
Senior Vice President, Cloud Solutions
February 6, 2017
Detect and Secure IoT and Rogue Devices, While Satisfying NIST RMF Security Requirements premium
We all know that the Internet of Things (IoT) is here. But IT professionals responsible for enterprise communications networks aren’t exactly sure where IoT resides on their networks or whether these devices are secured. Rogue devices are everywhere (although not all are out to steal the blueprints to the Death Star) but according to a […]
premium
Government Tech Writer
December 9, 2014
The Internet of Things is at Work in Our Cities this Winter premium
The “Internet of Things” – it’s everywhere right now! The “Internet of Things” or IoT, for short, refers to the next evolution of the internet when everyday objects are networked to the web and each other. Smart watches, connected cars, appliances, houses, and more – very soon every physical thing will be accessible through the […]
premium
editor@acronymonline.org'
Man-in-the-Middle Cyber Attacks | What & How premium
What is a Man-in-the-Middle attack and why is it so worrisome for cybersecurity experts? Josh defines it, offers examples, and explains why they're currently so devastating.
premium
josh.davis@www.dlt.com'
February 3, 2014
Technically News – 2/3 premium
This week in Technically News: Federal Contractors Should Implement Cybersecurity in Operations & Products, Says DoD & GSA; 20 Cloud Computing Statistics Every CIO Should Know; One Way Lawmakers Are Trying to Prevent Government IT Disasters; Internet of Things Adds to Cybersecurity Challenge; FedRAMP Deadline Looms For Agencies, Cloud Providers
premium
NewsJosh@www.dlt.com'
December 26, 2013
The Internet of Hackable Things premium
The market for wearable technology will explode over the next three years, bringing about the age of the Internet of Things and everyday cybersecurity issues like the aforementioned. And thanks to a recent Symantec finding, hackers aren’t waiting for popular adoption before using what’s already on the market to spy. You think BYOD is bad now? Hold tight.
premium
josh.davis@www.dlt.com'